<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA product line in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-product-line/m-p/1208443#M861466</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just wanted to update everyone on the solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA auditing has a signature "2151" that prohibits large packet sizes beyond 992 bytes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command to disable this signature is: ip audit signature 2151 disable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to re-enable: no ip audit signature 2151 disable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Apr 2009 17:12:04 GMT</pubDate>
    <dc:creator>chrisv2005</dc:creator>
    <dc:date>2009-04-01T17:12:04Z</dc:date>
    <item>
      <title>ASA product line</title>
      <link>https://community.cisco.com/t5/network-security/asa-product-line/m-p/1208442#M861465</link>
      <description>&lt;P&gt;Just a quick question. As far as PIX and ASA technology, is there a reason why you cannot ping test the outside/public ASA with packet sizes over 1000 or 1500 bytes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, all ICMP echos and relpy commands are present and you can ping and get replys using nomral 32 byte packets. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is when you ping the outside/public interface with packets larger than 1000 or 1500 byte packets. Is there some IPS or signature rule on ASA's or PIX with IOS version 7 or 8 , that prevent such large packets? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have noticed on various sites that this is the case on all our PIX and ASA's. Just wondering if this is a common signature on Firewall technology to protect the network from outside attacks. Your help is much appreciated. Thanks &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-product-line/m-p/1208442#M861465</guid>
      <dc:creator>chrisv2005</dc:creator>
      <dc:date>2019-03-11T15:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA product line</title>
      <link>https://community.cisco.com/t5/network-security/asa-product-line/m-p/1208443#M861466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just wanted to update everyone on the solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA auditing has a signature "2151" that prohibits large packet sizes beyond 992 bytes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command to disable this signature is: ip audit signature 2151 disable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to re-enable: no ip audit signature 2151 disable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Apr 2009 17:12:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-product-line/m-p/1208443#M861466</guid>
      <dc:creator>chrisv2005</dc:creator>
      <dc:date>2009-04-01T17:12:04Z</dc:date>
    </item>
  </channel>
</rss>

